Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Face Manipulation Detection (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(1/121)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Future trends in digital face manipulation and detection
Tolosana, Ruben
;
Rathgeb, Christian
;
Vera-Rodriguez, Ruben
;
Busch, Christoph
;
Verdoliva, Luisa
;
Lyu, Siwei
;
Nguyen, Huy H.
;
Yamagishi, Junichi
;
Echizen, Isao
;
Rot, Peter
;
Grm, Klemen
;
Štruc, Vitomir
;
Dantcheva, Antitza
;
Akhtar, Zahid
;
Romero-Tapiador, Sergio
;
Fierrez, Julian
;
Morales, Aythami
;
Ortega-Garcia, Javier
;
Kindt, Els
;
Jasserand, Catherine
;
Kalvet, Tarmo
;
Tiits, Marek
Handbook of digital face manipulation and detection : from deepfakes to morphing attacks
2022
/
p. 463-482 : ill
https://doi.org/10.1007/978-3-030-87664-7_21
book article
2
book article
Promises, social, and ethical challenges with biometrics in remote identity onboarding
Laas-Mikko, Katrin
;
Kalvet, Tarmo
;
Derevski, Robert
;
Tiits, Marek
Handbook of digital face manipulation and detection : from deepfakes to morphing attacks
2022
/
p. 437-462 : ill
https://doi.org/10.1007/978-3-030-87664-7_20
book article
Number of records 2, displaying
1 - 2
keyword
121
1.
Face Manipulation Detection
2.
face detection
3.
grain size manipulation
4.
manipulation
5.
opinion manipulation
6.
profit manipulation
7.
social manipulation
8.
FACE
9.
face masks
10.
face recognition
11.
front-face fluorescence
12.
amoxicillin detection
13.
anomaly detection
14.
anomaly detection for system logs
15.
antibiotic detection
16.
antibiotics detection
17.
aspect detection
18.
asynchronous fault detection
19.
attack detection
20.
barotrauma detection system
21.
behaviour-based intrusion detection systems
22.
body detection
23.
botnet detection
24.
capacitively coupled conductivity detection
25.
change detection
26.
chemical detection
27.
community detection
28.
compu ter-aided detection(CAD)
29.
computer-aided detection
30.
computer‐aided detection
31.
contactless conductivity detection
32.
contactless conductivity detection (C4D)
33.
crack detection
34.
crash detection
35.
cyber intrusion detection
36.
defect detection
37.
detection
38.
detection efficiency
39.
detection engineering
40.
detection method
41.
detection methods
42.
detection of anomalous end user nodes
43.
detection of hydrogen isotopes
44.
distributed detection
45.
early detection
46.
early intrusion detection
47.
energy detection
48.
error detection
49.
ESI-MS and IM detection
50.
Event detection
51.
extraction and detection methods
52.
failure detection
53.
fall detection
54.
fault detection
55.
fault detection and diagnoses
56.
fault detection and diagnosis
57.
Fish detection
58.
fouling detection
59.
harmonic detection
60.
hepatitis C virus (HCV) detection
61.
hubs detection
62.
IED detection
63.
image-based crack detection
64.
indicident detection and response
65.
indirect UV absorbance detection
66.
intrusion detection
67.
intrusion detection system
68.
intrusion detection system (IDS)
69.
intrusion detection systems
70.
island detection
71.
islanding detection
72.
label-free detection
73.
lane detection
74.
LED fluorescence detection
75.
leg detection
76.
light detection and ranging
77.
light detection and ranging (LiDAR)
78.
Light Detection and Ranging (LiDAR) point cloud
79.
limit of detection
80.
lock-in detection
81.
loop-closure detection
82.
malware detection
83.
marker detection
84.
mobile malware detection
85.
money laundering detection systems
86.
monitoring and detection
87.
multi-classed object detection
88.
Multi-valued Simulation for Hazard Detection in Digital Circuits
89.
mutant detection
90.
network anomaly detection
91.
network intrusion detection system
92.
nodules detection
93.
object detection
94.
oil-spill detection
95.
outlier’s detection methods
96.
outliers detection
97.
peak detection
98.
phytoplankton detection methods
99.
plagiarism detection
100.
position detection
101.
precursor detection
102.
protein detection
103.
proton detection
104.
radar detection
105.
ramp event detection
106.
recycled FPGA detection
107.
residual current detection
108.
robust detection
109.
scene text detection
110.
short-circuit detection
111.
small molecule detection
112.
speech activity detection
113.
Suicidal ideation detection
114.
synchronous detection
115.
tyre detection
116.
unmanned aerial vehicle detection systems
117.
unsupervised outlier detection
118.
UV detection
119.
vehicle detection
120.
vortex detection
121.
3D lane detection
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT